+

Chandio et al., 2024 - Google Patents

Stealthy and practical multi-modal attacks on mixed reality tracking

Chandio et al., 2024

View PDF
Document ID
1029941557388387796
Author
Chandio Y
Bashir N
Anwar F
Publication year
Publication venue
2024 IEEE International Conference on Artificial Intelligence and eXtended and Virtual Reality (AIxVR)

External Links

Snippet

Mixed Reality (MR) is rapidly becoming an essential technology for critical applications such as physical therapy and surgery, in addition to its early use for leisure activities. This transition necessitates a focused look at the security aspects of MR devices and …
Continue reading at par.nsf.gov (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/85Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/011Arrangements for interaction with the human body, e.g. for user immersion in virtual reality
    • G06F3/012Head tracking input arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/011Arrangements for interaction with the human body, e.g. for user immersion in virtual reality
    • G06F3/013Eye tracking input arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/011Arrangements for interaction with the human body, e.g. for user immersion in virtual reality
    • G06F3/014Hand-worn input/output arrangements, e.g. data gloves
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode

Similar Documents

Publication Publication Date Title
Sikder et al. A survey on sensor-based threats and attacks to smart devices and applications
Sikder et al. A survey on sensor-based threats to internet-of-things (iot) devices and applications
Yu et al. A survey on cyber–physical systems security
US12380455B2 (en) Method, device, and system of detecting mule accounts and accounts used for money laundering
US10685355B2 (en) Method, device, and system of detecting mule accounts and accounts used for money laundering
Wang et al. A survey on recent advanced research of CPS security
US10579817B2 (en) Systems and methods for front-end and back-end data security protocols
US11265721B1 (en) Secure device attestation and mutual authentication of artificial reality devices
Uluagac et al. Sensory channel threats to cyber physical systems: A wake-up call
Chandio et al. Stealthy and practical multi-modal attacks on mixed reality tracking
US11087029B1 (en) Encryption engine and decryption engine with glitch randomization to prevent side channel attacks
US20230368206A1 (en) System, Device, and Method of Transaction Verification Based on Auxiliary Signals and Modulations
US20200250296A1 (en) Detecting compromised credentials by improved private set intersection
US20230403270A1 (en) System and method for dynamic user authentication
Chen et al. Internet of Things (IoT) authentication and access control by hybrid deep learning method-a study
US20210184832A1 (en) Multi-key encryption and decryption for side channel attack prevention
Zhang et al. Presence attestation: The missing link in dynamic trust bootstrapping
US20230298226A1 (en) Systems and methods for ar/vr device improvements
Assaderaghi et al. Privacy and security: Key requirements for sustainable IoT growth
US12373539B2 (en) Systems and methods for using occluded 3D objects for mixed reality CAPTCHA
Sniatala et al. Evolution of Smart Sensing Ecosystems with Tamper Evident Security
Sobana et al. Securing future autonomous applications using cyber-physical systems and the Internet of Things
Shang Security and Privacy of Augmented Reality Systems
Jiang et al. False Reality: Uncovering Sensor-induced Human-VR Interaction Vulnerability
Chen et al. Securing Augmented Reality Applications
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载